Showing 1–20 of 20 results
/ Date/ Name
Oct 18, 2019Reflecting After Learning for UnderstandingJul 18, 2024Scaling Granite Code Models to 128K ContextJul 31, 2020Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free CasesJun 11, 2020A Primer on Zeroth-Order Optimization in Signal Processing and Machine LearningJun 26, 2020Proper Network Interpretability Helps Adversarial Robustness in ClassificationAug 23, 2024Power Scheduler: A Batch Size and Token Number Agnostic Learning Rate SchedulerJun 13, 2022Distributed Adversarial Training to Robustify Deep Neural Networks at ScaleJul 7, 2024The infrastructure powering IBM's Gen AI model developmentAug 23, 2024Hierarchical Optimal Dispatch of Active Distribution Networks Considering Flexibility Auxiliary Service of Multi-community Integrated Energy SystemsOct 31, 2025Secure Communication in the Presence of an RIS-Enhanced Eavesdropper in MIMO NetworksFeb 12, 2023Rapid Development of Compositional AIApr 8, 2024Dense Training, Sparse Inference: Rethinking Training of Mixture-of-Experts Language ModelsApr 3, 2019Interpreting Adversarial Examples by Activation Promotion and SuppressionOct 18, 2019Adversarial T-shirt! Evading Person Detectors in A Physical WorldFeb 1, 2021Fast Training of Provably Robust Neural Networks by SinglePropNov 1, 2021When Does Contrastive Learning Preserve Adversarial Robustness from Pretraining to Finetuning?Oct 31, 2025Byzantine Attacks in RIS-Enhanced Cooperative Spectrum Sensing: A Decision Fusion PerspectiveMar 18, 2021Generating Adversarial Computer Programs using Optimized ObfuscationsFeb 19, 2024UnlearnCanvas: Stylized Image Dataset for Enhanced Machine Unlearning Evaluation in Diffusion ModelsMay 7, 2024Granite Code Models: A Family of Open Foundation Models for Code Intelligence